Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the The SecOps Group AppSec Practitioner CAP Questions and answers with ValidTests

Exam CAP All Questions
Exam CAP Premium Access

View all detail and faqs for the CAP exam

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

After purchasing an item on an e-commerce website, a user can view his order details by visiting the URL:

https://example.com/order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id.

Which of the following is correct?

Options:

A.

The root cause of the problem is a lack of input validation and by implementing a strong whitelisting, the problem can be solved

B.

The root cause of the problem is a weak authorization (Session Management) and by validating a user's privileges, the issue can be fixed

C.

The problem can be solved by implementing a Web Application Firewall (WAF)

D.

None of the above

Expert Solution
Questions # 2:

If the end-user input is not validated or sanitized, an application created using which of the following languages or frameworks might be prone to Insecure Deserialization vulnerability?

Options:

A.

.NET

B.

Java

C.

PHP

D.

All of the above

Expert Solution
Questions # 3:

What is the full form of SAML?

Options:

A.

Security Assertion Markup Language

B.

Security Authorization Markup Language

C.

Security Assertion Management Language

D.

Secure Authentication Markup Language

Expert Solution
Questions # 4:

Null Byte Injection is an active exploitation technique used to bypass sanity-checking filters in web applications by adding a URL-encoded null byte character to the user-supplied data. Which of the following is a URL-encoded representation of a null byte?

Options:

A.

%01

B.

%10

C.

%25

D.

%00

Expert Solution
Questions # 5:

Which of the following hashing algorithms is considered to be the most secure amongst these?

Options:

A.

SHA-0

B.

MD5

C.

SHA-1

D.

Bcrypt

Expert Solution
Questions # 6:

Multifactor authentication will NOT be able to prevent:

Options:

A.

Cross-Site Scripting Vulnerability

B.

Cross-Site Request Forgery Vulnerability

C.

Path Traversal Vulnerability

D.

All of the above

Expert Solution
Questions # 7:

Which SQL function can be used to read the contents of a file during manual exploitation of the SQL injection vulnerability in a MySQL database?

Options:

A.

READ_FILE()

B.

LOAD_FILE()

C.

FETCH_FILE()

D.

GET_FILE()

Expert Solution
Questions # 8:

Which of the following is NOT a Server-Side attack?

Options:

A.

OS Code Injection

B.

Cross-Site Request Forgery

C.

SQL Injection

D.

Directory Traversal Attack

Expert Solution
Questions # 9:

In the context of the Race Condition vulnerability, which of the following statements is true?

Options:

A.

A situation that occurs when two threads access the same resource at the same time.

B.

A situation that occurs when two threads access different resources at the same time.

C.

A situation that occurs when a single thread unpredictably accesses two resources.

D.

A situation that occurs when a single thread predictably accesses two resources.

Expert Solution
Questions # 10:

An application’s forget password functionality is described below:

The user enters their email address and receives a message on the web page:

“If the email exists, we will email you a link to reset the password”

The user also receives an email saying:

“Please use the link below to create a new password:”

http://example.com/reset_password?userId=5298

Which of the following is true?

Options:

A.

The reset link uses an insecure channel

B.

The application is vulnerable to username enumeration

C.

The application will allow the user to reset an arbitrary user’s password

D.

Both A and C

Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions